- Kali Linux 2018:Assuring Security by Penetration Testing
- Shiva V. N Parasram Alex Samm Damian Boodoo Gerard Johansen Lee Allen Tedi Heriyanto Shakeel Ali
- 106字
- 2021-06-24 18:19:05
Nmap half-open/stealth scan
This option will start by sending (SYN) a connection on each port on a target host. If the port is open, the host will reply to the request with (SYN, ACK).
If the port is not open (that is, closed), the host will answer with a connection reset (RST).
If no response is received, it is assumed that the port is filtered. The difference between a TCP scan and a stealth scan is that the connection initiator will not respond with an acknowledgement (ACK) packet. What makes this an effective scan is that since a full connection wasn't established it won't be logged.
推薦閱讀
- 特種木馬防御與檢測技術研究
- 白帽子講Web安全(紀念版)
- 數據安全與隱私計算(第3版)
- 網絡安全技術與實訓(第4版)(微課版)
- 可信計算3.0工程初步(第二版)
- 從實踐中學習Kali Linux滲透測試
- Building a Home Security System with BeagleBone
- 信息安全導論(第2版)
- 網絡安全態勢感知
- 構建新型網絡形態下的網絡空間安全體系
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- Cybersecurity Threats,Malware Trends,and Strategies
- Learn Azure Sentinel
- 信息系統安全等級化保護原理與實踐
- 動態賦能網絡空間防御